On Scrambling: A Reply to Bošković and Takahashi
نویسنده
چکیده
In this article I argue against Bošković and Takahashi’s (1998) analysis of scrambling as base generation (with lowering for Ā-cases). I present evidence from Russian of scope and antireconstruction effects and scrambling/wh-movement parallels, all implicating a ‘‘classical’’ overt movement account of Ā-scrambling. I then discuss theoretical issues unresolved by the base generation/lowering account. Having shown that Ā-scrambling is (upward) movement, I argue that the account of A-scrambled arguments as base-generated also loses its force. In conclusion I suggest an alternative way to eliminate the apparent optionality associated with scrambling, while maintaining the classical analysis of scrambling as upward movement.
منابع مشابه
On the ‘‘Undoing’’ Property of Scrambling: A Response to Bo'ković
Bo'ković (2004) argues that what defines scrambling in languages such as Japanese is its ‘‘undoing’’ property (Saito 1989). Bo'ković (2004) and Bo'ković and Takahashi (1998) argue that this ‘‘undoing’’ property shows the way for scrambling to count as a last-resort operation, instead of being purely optional as is widely believed. In this article, I give empirical evidence that ‘‘undoing’’ does...
متن کاملMultinuclear Variable Temperature NMR Studies on Cyanide, Water and Hydroxyl Group Scrambling on Halogenation of K2[Pt(CN)4] and Related Reactions
195Pt and 1H NMR has been used to show that addition of chlorine and bromine to [Pt(CN)4]2_ in presence of perchloric acid in water results in cyanide and water scrambling with formation of eleven complexes of the type [Pt(CN)4-nCl(H2O)n+1](n-1)+ (n=0, 1, 2, 3, 4). Addition of NBu4OH ...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کامل